You are on page 1of 19

NETWORK SECURITY OVER WAN

Submitted to : submitted by
Simar preet Sir
A.RevanthGuptha
GU-2017-1059

1
OVERVIEW
 What is security?
 What is network Security ?
 Methods of Network Security ?
 NAT.
 SNAT
 DNAT
 OVERLOAD NAT
 ACL.
 STANDARD
 EXTENDED
 VLAN.
 PROJECT DESIGN.
2
WHAT IS SECURITY ?

 The state of being free from danger or


threat.

 It is the degree of resistance or to protection


from harm.

 Security is the protection of information


equipment through the use of technology,
process and training.

3
WHAT IS NETWORK SECURITY ?
 Network Security consists of the provision
and polices adopted by a network
administrator to prevent and monitor
unauthorized access, misuse.

 This means that a well- implemented n/w


security blocks viruses , malware, hacker
from accessing secure information.

4
TECHNOLOGY USED

CISCO PACKET TRACER

5
NETWORK SECURITY
CONCEPTS !!

 NAT(Network Address Translation)


 ACL(Access List)
 VLAN( Virtual Local Area Network )

6
NAT (NETWORK ADDRESS
TRANSLATION)
 It used for security purpose.
 By using NAT you can hide a private Network
& it convert Private IP to Public IP.
 NAT is implemented only on the END Router
of the Network.

7
TYPES OF NAT
 STATIC NAT : In this NAT, one to one
mapping is used and it convert Private IP into
Public IP.
 DYNAMIC NAT: In this NAT, many to many
mapping is used, it is used for large network.
 OVERLOAD NAT ( PAT ): In this NAT, Many to
One mapping is used and all private IP is
convert into One Public IP But only the port
number is different.

8
DESIGN OF NAT

9
ACL(ACCESS LIST)
 It is a list of command, which is used for
security purpose
 By using access list, we can block a single PC
or Whole Network / Single Protocol or all
Protocol.

10
TYPES OF ACL
 NUMBER ACL
 StandardAccess list.
 Extended Access list.
 NAMED ACL
 StandardAccess list.
 Extended Access list.

11
DESIGN OF ACCESS-LIST

12
VLAN(VIRTUAL LOCAL AREA
NETWORK)
 It is used for security purpose a single layer
to n/w may be divided into multiple distinct
Broadcast domain which are mutually
isolated.
 A VLAN has a same attribute as a physical
LAN but it allows for end station to be
grouped together more easily.
 By default VLAN is 1. range (1-1005)

13
14
DESIGN OF VLAN

15
PROJECT DESIGN

16
PAGE 1

17
PAGE 2 OF PROJECT DESIGN

18
THANK YOU

19

You might also like